Enables security professionals to analyze Active Directory and Azure AD environments through natural language queries by connecting to BloodHound's Neo4j database. Provides a concrete MCP server example for security/IT. (Merged with 'Bloodhound MCP AI')
Loading more......
Bridges to the Binalyze AIR digital forensics platform, providing endpoint security management through an MCP server.
MCP server designed for analyzing ROADrecon gather results from Azure tenant enumeration, illustrating specialized security analysis via MCP servers.
MCP server running inside a trusted execution environment (TEE) via Gramine, showcasing remote attestation using RA-TLS.
A Model Context Protocol (MCP) server to enforce CISA BOD 25-01 security controls for Microsoft 365 via Microsoft Graph API, enabling automated policy management and compliance monitoring.
An MCP server running inside a trusted execution environment, enabling remote attestation and secure server verification for MCP clients.
Bridges to the DefectDojo vulnerability management system, enabling interaction with security findings, products, and engagements via the Model Context Protocol. Relevant as an MCP server integration for security workflows.
security-attestation-mcp-servers
Bloodhound MCP (Model Context Protocol) is an extension of the BloodHound tool that enables security professionals to analyze Active Directory (AD) and Azure Active Directory (AAD) environments using natural language queries. It connects to BloodHound's Neo4j database and allows users to interact with their AD/AAD data via conversational commands, leveraging the capabilities of Large Language Models (LLMs).
No pricing information is provided; Bloodhound MCP is available as an open-source project on GitHub.
security, active-directory, azure-ad, neo4j